Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 23640 dokumen yang sesuai dengan query
cover
Khalid, Ayesha
"This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations."
Singapore: Springer Nature, 2019
e20507856
eBooks  Universitas Indonesia Library
cover
Fauzan Deri Syawalino
"Seiring berjalannya waktu, era digitalisasi sudah semakin menjamur menuju berbagai macam faktor dalam kehidupan manusia, tak terkecuali dalam faktor finansial. Adapun salah satu bentuk kemajuan teknologi dalam sudut pandang finansial adalah dengan maraknya bank digital yang diyakini dapat memudahkan para nasabah untuk melakukan kegiatan di dalamnya secara online seperti pembuatan rekening hingga transaksi transfer uang tanpa harus mengunjungi kantor fisik. Karena seluruh aktivitas yang ada akan dilakukan sepenuhnya secara online, maka pihak bank digital telah mengimplementasikan algoritma enkripsi kriptografi untuk melindungi informasi pribadi dan data kredensial para nasabah bank digital tersebut. Namun, di lain sisi, algoritma enkripsi yang ada saat ini pun sudah cukup bervariatif. Dengan ini, akan dilakukan suatu penelitian yang akan mengkaji algoritma enkripsi kriptografi yang telah diimplementasikan oleh salah satu Bank Digital di Indonesia. Penelitian ini akan membahas algoritma enkripsi apa yang telah dipilih untuk mengamankan data-data kredensial terkait. Nantinya, pada akhir penelitian ini akan dilakukan analisis terhadap keamanan dari algoritma enkripsi tersebut dengan menghitung nilai Avalanche Effect yang ada. Adapun algoritma enkripsi tersebut dapat memiliki performa yang baik apabila menghasilkan nilai Avalanche Effect cenderung mendekati 50%.

As the time goes by, the era of digitalization has increasingly taken all over the place towards various factors in human life, including financial. One massive example of technological improvement from a financial point of view is the rise of digital banks which are believed to bring convenience for customers to carry out activities online such as creating accounts and transfer transactions without having to visit a physical office. Since all existing activities will be carried out entirely online, the digital bank has implemented a cryptographic encryption algorithm to protect the personal information and credential data of the digital bank's customers. However, on the other hand, the existing encryption algorithms are quite varied. Therefore, this study will be carried out which will examine the cryptographic encryption algorithm that has been implemented by one of the digital banks in Indonesia. This research will discuss which encryption algorithm has been chosen to secure all existing credential data. Later, at the end of this study, an analysis of the security of the encryption algorithm will be carried out by calculating the Avalanche Effect value. The encryption algorithm can have good performance if it produces an Avalanche Effect with value closer to 50%."
Depok: Fakultas Teknik Universitas Indonesia, 2023
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Agung Widodo
"Memasuki era transformasi digital, pertukaraan informasi menjadi aspek paling vital bagi hampir seluruh organisasi, terlebih lagi informasi rahasia dan strategis. Beragam preseden buruk tentang kebocoran informasi rahasia dan strategis di Indonesia menjadi tamparan keras yang harus dijawab dengan solusi efektif. Instansi XYZ telah mengembangkan aplikasi enkripsi file ABC pada tahun 2020 untuk menjawab tantangan pengamanan informasi rahasia khususnya yang ditransmisikan pada kanal elektronik. Hingga tahun 2022, aplikasi ABC telah diimplementasikan secara terbatas dan rencananya, skala implementasi akan diperluas secara nasional. Selang 2 tahun masa operasional, Instansi XYZ telah melakukan kajian terhadap keamanan algoritma yang digunakan dalam Aplikasi ABC, namun belum melakukan kajian mendalam terhadap keamanan rangkaian protokol yang digunakan dalam Aplikasi tersebut. Pada peneitian ini dilakukan analisis keamanan protokol registrasi, verifikasi pengguna, pembangkitan kunci, dan permintaan kunci untuk proses enkripsi-dekripsi Aplikasi ABC dengan pendekatan verifikasi formal menggunakan Scyther Tool. Analisis berfokus pada aspek jaminan kerahasiaan informasi dan autentikasi dengan empat kriteria yaitu secrecy, aliveness, synchronization, dan agreement. Hasil percobaan menunjukkan bahwa protokol-protokol tersebut telah menenuhi kriteria secrecy untuk informasi rahasia yang ditransmisikan namun memiliki kelemahan umum pada pada autentikasi khususnya untuk kriteria synchronization dan agreement. Berdasarkan kelemahan tersebut, peneliti mengajukan desain konseptual protokol yang mampu mengatasi kelemahan-kelemahan yang teridentifikasi. Hasilnya, desain protokol yang diajukan peneliti terbukti provably secure berdasarkan hasil pengujian dan memenuhi empat kriteria keamanan pada aspek kerahasiaan informasi dan autentikasi entitas dan isi pesan.

In the era of digital transformation, information exchange, especially confidential and strategic information has become the most vital aspect for almost all organizations. Various bad precedents regarding classified and strategic information leaks in Indonesia have become a slap in the face that must be acknowledge and answered with effective solutions. In 2020, XYZ Agency developed a file encryption application (ABC Application) to address the challenge of securing confidential information, especially those transmitted on electronic channels. Until 2022, the ABC Application has been implemented in a limited scope and its implementation is planned to be expanded nationally. After 2 years of operation, the XYZ Agency has conducted a study on the security of the algorithm used in ABC Application, but unfortunately has not conducted an in-depth study regarding the security of the protocol suite used in the Application. In this research, a security analysis of ABC application protocol suites, namely the registration protocol, user verification, key generation, and key request for the encryption-decryption process protocol was conducted through formal verification approach using the Scyther Tool. The analysis focuses on aspects of guaranteeing confidentiality of information and authentication with four criteria, namely secrecy, aliveness, synchronization, and agreement. The experimental results showed that these protocols meet the security criteria for the transmitted confidential information but have general weaknesses in the authentication aspect, especially for synchronization and agreement criteria. Based on these identified weaknesses, We proposed a robust conceptual protocol design to overcome these weaknesses. As a result, the proposed design was proved to be provably secure based on the test results and met the four security criteria in the aspects of information confidentiality and authentication in terms of entity authentication and message content integrity. "
Jakarta: Fakultas Teknik Universitas Indonesia, 2022
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
"This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products. "
Switzerland: Springer Nature, 2019
e20506932
eBooks  Universitas Indonesia Library
cover
Elliott, John P.
"Behavioral Synthesis: A Practical Guide to High-Level Design includes details on new material and new interpretations of old material with an emphasis on practical information. The intended audience is the ASIC (or high-end FPGA) designer who will be using behavioral synthesis, the manager who will be working with those designers, or the engineering student who is studying leading-edge design techniques. Today's designs are creating tremendous pressures for digital designers. Not only must they compress more functionality onto a single IC, but this has to be done on shorter schedules to stay ahead in extremely competitive markets. To meet these opposing demands, designers must work at a new, higher level of abstraction to efficiently make the kind of architectural decisions that are critical to the success of today's complex designs.CD-ROM contains the source code and test benches for the three case studies discussed in Chapters 14, 15 and 16."
Boston: Springer Us, 1999
621ELLU001
Multimedia  Universitas Indonesia Library
cover
Elliott, John P.
"Behavioral Synthesis: A Practical Guide to High-Level Design includes details on new material and new interpretations of old material with an emphasis on practical information. The intended audience is the ASIC (or high-end FPGA) designer who will be using behavioral synthesis, the manager who will be working with those designers, or the engineering student who is studying leading-edge design techniques. Today's designs are creating tremendous pressures for digital designers. Not only must they compress more functionality onto a single IC, but this has to be done on shorter schedules to stay ahead in extremely competitive markets. To meet these opposing demands, designers must work at a new, higher level of abstraction to efficiently make the kind of architectural decisions that are critical to the success of today's complex designs.CD-ROM contains the source code and test benches for the three case studies discussed in Chapters 14, 15 and 16."
Boston: Springer, 1999
621ELLU002
Multimedia  Universitas Indonesia Library
cover
Rodriguez Breil Soenoto
"Penyandian blok merupakan salah satu jenis enkripsi yang sering digunakan untuk komunikasi aman, karena dapat diimplementasikan dengan mudah dan praktis. Namun, sandi blok hanya dapat mengenkripsi satu blok data dengan ukuran tertentu. Oleh karena itu, penggunaan sandi blok disertai dengan mode-mode operasi, yang membagi data ke dalam beberapa blok dan melibatkan masukan-masukan lain. Dalam tulisan ini, beberapa mode operasi sandi blok dari skema enkripsi AES diimplementasikan dalam bahasa C dan dianalisis dari segi keamanan, performa, dan penggunaan sumber daya. Hasil perbandingan ini akan dapat digunakan sebagai pertimbangan untuk memilih metode enkripsi untuk beberapa kasus komputasi dimana sistem memiliki kemampuan terbatas dan performa lebih diutamakan.

Block ciphers are a type of encryption often used for secure communication, due to its ease of implementation and practicality. However, block ciphers can only encrypt one block of data at a time of a specific size. Therefore, block cipher implementations employ a mode of operation, that divides data into several blocks and involves other inputs. In this paper, several block cipher modes of operation with the AES cryptoscheme are implemented in the C programming language and analyzed from the security, performance, and resource perspectives. The results can then be used as information in determining an encryption method for a particular computation use case where system capabilities are limited and performance is an important factor."
Depok: Fakultas Teknik Universitas Indonesia, 2023
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
"Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board."
Berlin: Springer-Verlag, 2012
e20409533
eBooks  Universitas Indonesia Library
cover
David Pointcheval, editor
"This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012.
The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices."
Berlin: Springer-Verlag, 2012
e20406359
eBooks  Universitas Indonesia Library
cover
Ling, Dong, editor
"This book mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism’s efficiency, rigorousness, and the possibility of its automation are also presented."
Beijing: [Higher Education Press, ], 2012
e20409957
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>